Introduction to MLS

Date: October 12, 2023
Time: 15:00 UTC - 16:00 UTC
Register: Register
Messaging applications are widely used to send text messages, multimedia messages, or other forms of communication between individuals or groups. These applications are typically designed for instant messaging and real-time communication.  Some sample messaging applications include: WhatsApp, Facebook Messenger, Telegram, Signal, iMessage, Slack, Microsoft Teams, Skype and others.  These are just a few examples of messaging applications, and there are many others available, each with its own unique features and focus. The choice of messaging app often depends on individual preferences, security concerns, and the specific needs of the user or organization.

Several widely-deployed messaging applications have developed their own protocols. While these protocols are similar, no two are close enough to interoperate. As a result, each application vendor has had to maintain their own protocol stack and independently build trust in the quality of the protocol. The goal of the 

MLS

working group is to develop a standard messaging security protocol for human-to-human(s) communication with the above security and deployment properties so that applications can share code, and so that there can be shared validation of the protocol (as there has been with TLS 1.3).

This effort is likely to have a major impact on enterprises who use messaging application.  This session will explain the major components of MLS and some of the new security architecture.

How does TLS 1.3 work?

Date: August 10, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register

TLS 1.3, the latest version of the Transport Layer Security protocol, brings forth significant advancements and improvements over its predecessors. In this discussion, we will delve into some of the key changes introduced by TLS 1.3, namely the increased encryption in the handshake process, deprecation of specific key exchange algorithms, and the introduction of new extensions. Additionally, we will explore the implications of TLS 1.3 on network management within enterprises.

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which IBM and other software companies later marketed.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

Understanding TLS and the Handshake

Date: June 15, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register

In this one-hour webinar, we will delve into the world of Transport Layer Security (TLS) and focus on one of its fundamental components, the handshake. TLS is a cryptographic protocol widely used to secure communication over computer networks. By analyzing packet traces, we will demystify the TLS handshake process, step by step, and gain a comprehensive understanding of how it establishes secure connections.

Webinar Agenda:
  • The importance of TLS and secure communication
  • Overview of the TLS protocol
  • Explanation of its role in securing network communications
  • Discussion on the importance of the handshake process
  • A step-by-step breakdown of the TLS handshake process
  • Highlighting key TLS handshake message types and their significance
By the end of this webinar, participants will have a solid understanding of the TLS protocol, its handshake mechanism, and the role of packet traces in analyzing and troubleshooting TLS connections. Armed with this knowledge, attendees will be better equipped to secure their network communications and diagnose potential issues in TLS implementations.

Nalini Elkins is the President of the Industry Network Technology Council.   She is also the CEO and Founder of Inside Products, Inc.  Nalini is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she has been the founder or co-founder of four start-ups in the high-tech arena.

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

Fundamentals of Cryptography

Date: May 18, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register

This webinar is a part of the Cryptography webinar series.

Fundamentals of Cryptography – II

Date: April 20, 2023
Time: 15:00 UTC - 16:00 UTC
Slides: Slides
Recording: Recording
Register: Register

The goal for the second security session is to understand some of the terms which are crucial to cryptography.  The explanation will be for those implementing security protocols rather than academics or cryptographers. We will cover:

  • DES

  • 3DES

  • Asymmetric encryption / symmetric encryption

  • Elliptic curve cryptography

  • Certificate authorities

  • Diffie-Hellman key exchange

  • Diffie-Hellman groups

  • Hashed message authentication code (HMAC)

  • Message authentication code (MAC)

  • Message digest algorithm 5 (MD5)

  • Rivest Shamir Adleman (RSA)

  • Secure hash algorithm (SHA)

  • X.500 distinguished name

  • X.509 digital certificates

Nalini Elkins is the President of the Industry Network Technology Council.   She is also the CEO and Founder of Inside Products, Inc.  Nalini is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she has been the founder or co-founder of four start-ups in the high-tech arena.

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

Fundamentals of Cryptography – I

Date: February 23, 2023
Time: 16:00 UTC - 17:00 UTC
Slides: Slides
Recording: Recording
Register: Register

The goal for the first security session is to understand some of the terms which are crucial to cryptography.  The explanation will be for those implementing security protocols rather than academics or cryptographers. We will cover:

  • DES

  • 3DES

  • Asymmetric encryption / symmetric encryption

  • Elliptic curve cryptography

  • Certificate authorities

  • Diffie-Hellman key exchange

  • Diffie-Hellman groups

  • Hashed message authentication code (HMAC)

  • Message authentication code (MAC)

  • Message digest algorithm 5 (MD5)

  • Rivest Shamir Adleman (RSA)

  • Secure hash algorithm (SHA)

  • X.500 distinguished name

  • X.509 digital certificates

Nalini Elkins is the President of the Industry Network Technology Council.   She is also the CEO and Founder of Inside Products, Inc.  Nalini is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she has been the founder or co-founder of four start-ups in the high-tech arena.

Nalini started her career doing network design and monitoring for the Chevron network.  She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks. 

One of her specialties is training and network design for IPv6 migration for large enterprises.  Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.

She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies.   She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field.   Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).

Free Webinar Series: Security

Date: February 21, 2023
Time: 15:00 UTC - 16:00 UTC
Register: Register

From: Thursday, 23rd February 2023 to Thursday, 12th October 2023

Session Topics for Security webinars:

  1. Fundamentals of Cryptography: February 23, 11am Eastern, 9:30pm India 
  2. Fundamentals of Cryptography: April 20, 11am Eastern, 8:30pm India
  3. Fundamentals of Cryptography: May 18, 11am Eastern,  8:30pm India
  4. How does TLS work? (up to 1.3): June 15, 11am Eastern,  8:30pm India
  5. How does TLS1.3 work?: August 10, 11am Eastern,  8:30pm India
  6. Introduction to MLS: September 14, 11am Eastern,  8:30pm India
  7. MLS in Depth: October 12, 11am Eastern, 8:30pm India

Connections: IPv6; Loss of Security and Privacy; DNS (Day 1)

Date: April 4, 2022
Time: 14:00 UTC - 16:30 UTC
Slides: Slides
Recording: Recording
Connections

Connections is being held April 2-8, 2022, shortly after the IETF 113 meeting. It is a fully online event created jointly by IIESoc & INTC. The first day will include the following keynote presentations:

  • IPv6 — past, present & future by Bob Hinden
  • Going Dark — catastrophic security and privacy losses due to loss of visibility by managed private network operators by Dr. Paul Vixie
  • TBD by Ron Bonica

IPv6 Webinar Series: Introduction to IPv6 Security

Date: July 8, 2021
Time: 00:00 UTC - 00:00 UTC
Slides: Slides
Recording: Recording

This session discusses the ways enterprises might want to think about migration to IPv6. Some vulnerabilities may be the same as IPv4 while other will be different. Vulnerabilities may be introduced by additional complexity, for example, transition mechanisms or dual-stacking.When many enterprises think about security, a number of areas are involved. These include:

  • Audits/Compliance​
  • Threat detection
  • Risk analysis
  • Root cause determination
  • Encryption
  • Privacy​
  • Confidentiality
  • ​Penetration testing

​Presented by Nalini Elkins.

Can we STIR and SHAKE(n) our way out of unwanted robocalls?

Date: October 22, 2020
Time: 00:00 UTC - 00:00 UTC
Slides: Slides
Recording: Recording

Unwanted and illegal robocalls continue to be both one of the largest communications-related nuisances (particularly since many of us are home to get them all day…) and are commonly used to defraud victims using social security, warranty and other scams. Fighting these unwanted calls has proven to be hard and is likely to require a combination of approaches that may also hasten the end of the traditional circuit-switched public switched telephone network. I’ll describe why unwanted robocalls are probably harder to curtail than spam emails and what techniques may help. I’ll focus particularly on calling number authentication, standardized by the IETF and ATIS in the STIR and SHAKEN working groups. STIR/SHAKEN offer a good case study that protocol standards are necessary, but need to be augmented by additional organizational infrastructure and operational practices to be successful. However, calling number authentication combined with simple call filters may only offer a temporary respite from unwanted calls unless other holes in the call delivery chain are plugged that allow shady operators to place millions of calls.

Prof. Henning Schulzrinne, Levi Professor of Computer Science at Columbia University, received his Ph.D. from the University of Massachusetts in Amherst, Massachusetts. MTS at AT&T Bell Laboratories; associate department head at GMD-Fokus (Berlin), before joining the Computer Science and EE departments at Columbia University. He served as chair of Computer Science from 2004 to 2009 and as Engineering Fellow, Technical Advisor and Chief Technology Officer of the Federal Communications Commission (FCC) from 2010 until 2017.

Protocol standards co-developed by him, including RTP, RTSP and SIP, are now used by almost all Internet telephony and multimedia applications. Fellow of the ACM and IEEE.